Top Banner
05/30/22 1 Cryptography A necessity for internet security Anu-3304 APJIMTC
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptppt1

04/12/23 1

CryptographyA necessity for internet security

Anu-3304APJIMTC

Page 2: Cryptppt1

Introductionto

Web Security and Cryptography

Information security is basically a term that refers to the security level about keeping your information over the internet.

04/12/23 2

Page 3: Cryptppt1

Following aspects are strictly to be maintained for information security over internet:IntegrityConfidentialityAuthentication

Availability , access control etc. are some other aspects to be followed.

04/12/23 3

Authentication

Availability

Confidentiality

Integrity

Page 4: Cryptppt1

Cryptography –Web security Mechanism

It is an art of transforming messages to make them secure and immune to attacks.For example: scytale,Caesar cipher etc.Cryptography word has

originated from Greek word kryptos means hidden and graphy means writing.

04/12/23 4

Internet Security with Cryptography

Page 5: Cryptppt1

Why we need Cryptography

Assurance of confidentiality and security of their information and need such a mechanism that can’t be compromised.

Encryption is needed so that business

organizations and individuals can rely

on internet for their sensitive and

confidential information sharing.

04/12/23 5

Page 6: Cryptppt1

Vulnerabilities and attacks on information

securityKERCKHOFF’s Principle states that a system is secure even when everything ,except secret key, is known to the adversary.Cryptanalytic Attacks/Brute-Force Attack

According to above principle ,adversary has knowledge of everything except the key used to encrypt the text.In this approach,attacker can benefit from the mathematical weakness of algorithm.•Ciphertext-only attack•Known plaint-text attack•Chosen plain-text attack•Chosen cipher-text attack 

04/12/23 6

Page 7: Cryptppt1

Non-Cryptanalytic Attacks

In this approach,Mathematical weakness of algorithms are not explored.These attacks are passive attacks.

04/12/23 7

Page 8: Cryptppt1

Following types of passive attacks are there:Snooping

unauthorized user views secret files.

DOS

Denial of service due to multiple requests.Masquerading

IP spoofing.Interception

illegal monitoring of network

traffic.

04/12/23 8

Page 9: Cryptppt1

Techniques of Cryptography

Following mechanisms are used for encryption and decryption today:Symmetric-key Encipherment

A single key is used. Both sender and receiver communicates using this key.

04/12/23 9

Page 10: Cryptppt1

Asymmetric Technique Two keys : Public key and private key is used. Public key of receiver is used by senders and private key is used

by him only.

04/12/23 10

Page 11: Cryptppt1

Hashing Technique A fixed length digest is produced on the basis of input. Message is complete after combination of both the fixed

length digest and inputted message.

04/12/23 11

Page 12: Cryptppt1

Quantum Cryptography

Quantum encryption uses light particles called photons instead of bits for transmission.

A photon can have four orientations either horizontal,vertical,45 diagonal and -45 diagonal which is used to represent a bit – and / represents a 0 bit and | and \ represents a 1 bit.

04/12/23 12

Page 13: Cryptppt1

Each bit in a message is randomly translated into one of the two orientations connected with that bit.Actual message is then transmitted using fiber optics.

The receiver has filters on his end that converts message.

04/12/23 13

Page 14: Cryptppt1

Merits of cryptography

• Secrecy in transmission.• Secrecy in storage.• Integrity in transmission.• Authentication of identity.

04/12/23 14

Page 15: Cryptppt1

Demerits of Cryptography

Encryption is an expensive process. Doesn’t guarantees the security of information all times. Fastest Hardware is required . A trained administrator would be required . Not all operating systems are supported by EFS

04/12/23 15

Page 16: Cryptppt1

04/12/23 16